Qualification Guideline - Qualification Guideline for Microsoft Office 365
Qualification Guideline - Qualification Guideline for Microsoft Office 365
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 2 of 74 Document MTM-O365-GDE-01 Revision 01 Disclaimer: This document is meant as a reference to Life Science companies in regards to the Microsoft O365 platform. Montrium does not warrant that the use of the recommendations contained herein will result in a qualified system or that a system validated within Office 365 in accordance with this document will be acceptable to regulatory authorities.
This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
Limitation of Liability: In no event shall Montrium or any of its affiliates or the officers, directors, employees, members, or agents of each of them, be liable for any damages of any kind, including without limitation any special, incidental, indirect, or consequential damages, whether or not advised of the possibility of such damages, and on any theory of liability whatsoever, arising out of or in connection with the use of this information.
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 3 of 74 Document MTM-O365-GDE-01 Revision 01 Authors Michael Zwetkow VP Operations, Montrium Inc.
Stephanie Tanguay Quality Assurance Manager, Montrium Inc. Paul Fenton CEO, Montrium Inc. Gabrielle Soucy Sr. Business Analyst, Montrium Inc.
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 4 of 74 Document MTM-O365-GDE-01 Revision 01 Foreword Over the last few years, Microsoft has paid an increasing amount of attention to a couple of key concepts that are represented in this whitepaper: compliance and the cloud. Together these concepts represent a fairly radical departure from normal business. By enabling cloud technologies, which provide an ease of use and ease of implementation, with compliance, which provides the ability to work with information in a regulatory compliant fashion, the implementing party may find the best of both worlds.
This set of guideline whitepapers show how Microsoft is committed to cloud and compliance, spanning Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), a relatively unique combination of technologies and commitment to compliance. At the end of the day these are qualification guidelines and do not represent any guarantees from Microsoft that your processes can be validated in any of the environments discussed or against any of the regulations or standards discussed. Yet when paired with the documentation referred to herein along with customer evidence, these guidelines offer customers a starting point for their own “compliance in the cloud” efforts, a starting point that may be furthered by the expertise Montrium has demonstrated in producing these guidelines.
Mohamed Ayad, Cloud Solution Specialist Les Jordan, Chief Technology Strategist Health & Life Sciences Industry Unit Microsoft
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 5 of 74 Document MTM-O365-GDE-01 Revision 01 Executive Summary The purpose of this document is to assist Microsoft’s life science customers in establishing a qualification strategy for the Microsoft Office 365 (O365) software service. This guideline identifies the responsibilities shared by Microsoft and its customers for meeting the regulatory requirements of FDA 21 CFR Part 11 Electronic Records; Electronic Signatures (21 CFR Part 11) and EudraLex Volume 4 - Annex 11 Computerised Systems (Annex 11).
The intended audience for this guideline is any regulated customer within the life sciences industry, aiming to use the O365 platform to run GxP regulated applications. It is assumed that these regulated applications will support GxP activities and produce and/or manage electronic records. Traditionally GxP computerized systems have been deployed on specific servers either directly or through the use of virtual machines. This underlying hardware was usually qualified, managed and specifically identified as being part of a specific instance of a GxP computerized system. With cloud computing this paradigm changes slightly.
The O365 software solution is composed of many hardware and software components which all fall under the same controls that have been identified in this guideline. Each time a new customer instance of O365 is commissioned, it is done using the same controlled process and standards. When considering public cloud based systems, it is important to view the whole public cloud as one system upon which we are able to install and run GxP computerized systems and applications. This guideline will help companies achieve this by providing references to the 21 CFR Part 11 controls that are present within the O365 environment and that should be identified in customer qualification documentation.
Microsoft’s GFS and O365 platform services have undergone SSAE 16 Service Organization Control (SOC) audits and are also certified according to ISO/IEC 27001:2005 standards. Although these standards do not specifically focus on regulatory compliance, their objectives are very similar to those of 21 CFR Part 11 and Annex 11. Montrium has therefore decided to leverage the reports produced by independent third party SSAE and ISO auditors to identify the procedural and technical controls established at Microsoft that could be used to satisfy the requirements of 21 CFR Part 11 and Annex 11. It was assumed that these audit reports were generated by qualified third party auditors and that all information contained within the reviewed audit reports was objective and accurate at the time of the audits.
It is expected that customers will perform an independent analysis and verification of relevant regulatory requirements to determine if the GxP applications deployed on O365 are fit for their intended purpose. The customer must also ensure that GxP applications system will be sufficiently documented and validated to further demonstrate compliance.
GFS delivers the core infrastructure and foundation technologies for Microsoft's Online Services environment. Microsoft Office O365 is subscription-based software service hosted by the Global Foundation Services (GFS) group within Microsoft managed data centers. The services included as part of O365 are Microsoft SharePoint Online, Microsoft Exchange Online, Microsoft Lync Online and Microsoft Forefront Online Protection for Exchange. This guideline focuses on the Microsoft SharePoint Online service, which is the only O365 service which when configured appropriately, provides the ability
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc.
Page 6 of 74 Document MTM-O365-GDE-01 Revision 01 to manage electronic records in manner that could satisfy applicable regulatory requirements. The O365 platform is classified as a public, off-premise, third-party managed solution which is offered via the SaaS cloud service model. From the perspective of a regulated user (customer), Microsoft Office is considered to be Category 4 – Configured Product as defined in GAMP5®. O365 is considered to be an “open system” per 21 CFR Part 11, therefore additional measures, such as encryption should be employed to further secure information stored within or transiting from the system.
It should be noted that only certain versions of O365 is able to meet the 21 CFR Part 11 requirements for open systems. Audited controls implemented by Microsoft serve to ensure confidentiality, integrity and availability of data stored on O365 and correspond to the applicable regulatory requirements defined in 21 CFR Part 11 and Annex 11 that have been identified as the responsibility of Microsoft. Microsoft is responsible for ensuring that O365 meets the terms defined within the governing Service Level Agreements (SLA). In addition to ensuring that computerized systems have the relevant technical controls outlined in the assessment contained within the guideline, the customer is also responsible for ensuring adequate procedural controls governing the use of the GxP computerized system are in place.
These procedural controls should cover the technical aspects of system management, including but not limited to logical security, user management, data backup and disaster recovery. There should also be procedural controls relating to the operation of the GxP computerized system. The customer should determine the GxP requirements that apply to the computerized system based on its intended use and follow internal procedures governing qualification and/or validation processes to demonstrate that the GxP requirements are met.
In conclusion, following the assessment performed by Montrium, it is felt that the audited procedural and technical controls that Microsoft has implemented could serve to demonstrate that the O365 platform is being maintained in a state of control that is in accordance with the applicable regulatory requirements. Moreover, the customer may leverage the audited controls described in this document and related audit reports as part of the risk analysis and qualification effort of their GxP applications deployed in the O365 environment.
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc.
Page 7 of 74 Document MTM-O365-GDE-01 Revision 01 Table of Contents Authors . . 3 Foreword . . 4 Executive Summary . . 5 Table of Contents . . 7 1 Introduction . . 8 1.1 Purpose . . 8 1.2 Key Definitions . . 8 1.3 Audience and Scope . . 9 1.4 Methodology . . 9 1.5 Glossary . . 11 2 System Overview . . 14 2.1 Global Foundation Services . . 14 2.2 Microsoft Office 365 . . 14 2.3 System Classification . . 15 2.4 Microsoft Audits and Certifications . . 16 2.5 Microsoft Controls . . 18 3 Qualification Approach . . 23 3.1 Qualification Activities and Responsibilities . . 24 3.2 US FDA 21 CFR Part 11 Electronic Records; Electronic Signatures Compliance Assessment .
. 26 3.3 EudraLex Volume 4 Annex 11 Computerised Systems Compliance Assessment . . 40 4 Conclusion . . 70 5 References . . 71 6 Appendices . . 72 Appendix A. Recommended Procedures / Policies . . 72
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 8 of 74 Document MTM-O365-GDE-01 Revision 01 1 Introduction 1.1 Purpose The purpose of this document is to assist Microsoft’s life science customers in establishing a qualification strategy for the Microsoft Office 365 (O365) software service, which is hosted on the infrastructure provided by the Global Foundation Services (GFS) group within Microsoft. The guidance provided in this document is based on the assumption that Microsoft’s customers will utilize the O365 service as a GxP application to perform GxP regulated activities.
This guideline identifies the responsibilities shared by Microsoft and its customers for meeting the regulations specified within Section 1.2. A summary is provided of the procedural and technical controls which govern the O365 service and can be leveraged by the regulated user (customer) to demonstrate compliance with applicable regulatory requirements. Also summarized within this guideline, are recommended activities and controls that should be established by customers in order qualify and maintain control over the GxP application configured to run on O365. The qualification approach outlined within this guideline is based on industry best practices with an emphasis on the concepts presented and described within ISPE’s, GAMP® series of Good Practice Guides (Ref.
) and PIC/S PI 011-3 Good Practices for Computerised Systems in Regulated ‘GxP’ Environments (Ref. ).
1.2 Key Definitions 1.2.1 GxP computerized system A GxP computerized system is defined as application configured on the O365 platform that will support activities and records governed by regulations pertaining to GLP, GCP and GMP environments. 1.2.2 GxP activity Any regulated activity performed with the context of GLP, GCP and GMP environments. 1.2.3 Customer Within the context of this guideline, the customer is defined as any person or persons using a GxP computerized system hosted on the O365 platform, who are responsible for the content of the electronic records produced and/or managed within the GxP computerized system.
1.2.4 Customer Data on Storage As per the Microsoft O365 Privacy Statement (Ref. ), “Customer Data is all the data, including all text, sound, software or image files that you provide, or are provided on your behalf, to us through your use of the Services.” For example, Customer Data on storage includes data that customers upload for storage or processing in the O365 platform, and applications that customer or customer’s end users upload for hosting in the Services. Customer Data on Storage does not include configuration or technical settings and information. Microsoft does not
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 9 of 74 Document MTM-O365-GDE-01 Revision 01 monitor or approve the applications that customers configure on O365. Microsoft does not claim ownership of the Data on Storage. Microsoft’s Online Services Use Rights (Ref. ) states “you [the customer] retain all right, title and interest in and to customer data. We [Microsoft] acquire no rights in customer data, other than the rights you grant to us for the applicable online service. This does not apply to software or services we license you.” Data security beyond the access controls mechanisms, including but not limited to fine-grain access controls or encryption, is the responsibility of the customer.
1.3 Audience and Scope The intended audience for this guideline is any regulated customer within the life sciences industry, aiming to configure the O365 platform for use as a GxP application(s). It is assumed that the application will support GxP activities and produce and/or manage electronic records. The specific GxP activities performed within the customer’s O365 environment are not addressed in this guidance document, as the customer is responsible for defining the requirements and evaluating the risk associated with each GxP application within the O365 environment. The regulations within the scope of this qualification guidance document are limited to the following: FDA 21 CFR Part 11 Electronic Records; Electronic Signatures - Subpart A and B (Sec 11.10 and Sec 11.30) (Ref.
)1 EudraLex Volume 4 - Annex 11 Computerised Systems (Ref. )2 The O365 platform consists of several services as described in Section 2.2; however, Microsoft SharePoint Online is the only service which could provide the ability to generate or manage electronic records within the context GxP regulated activities. Therefore, this guidance will focus on the functionality of SharePoint Online as it relates to the management of electronic records. This guideline also covers the underlying infrastructure components provided by the Global Foundation Services group upon which the O365 service is delivered to Microsoft customers.
1.4 Methodology Microsoft’s GFS and O365 platform services have undergone SSAE 16 Service Organization Control (SOC) audits and are also certified according to ISO/IEC 27001:2005 standards (see Section 2.4). Montrium has leveraged the reports produced by independent third party auditors to identify procedural and technical controls established at Microsoft which could be used to satisfy 1 21 CFR Part 11 subparts related to electronic signatures are out of scope for this guide, as Microsoft does not provide electronic signature functionality as part of the above services.
2 Although Eudralex Volume 4 Annex 11 specifically discusses GMP systems, it is generally accepted in industry that the same principals in the most part are applicable to GCP and GLP systems.
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 10 of 74 Document MTM-O365-GDE-01 Revision 01 regulatory requirements within US FDA 21 CFR Part 11 (Ref. ) and EudraLex Volume 4 - Annex 11 (Ref. ). These controls are described in detail in Section 2.5. Montrium based the analysis on the ISO and SSAE 16 standards as they have similar objectives to 21 CFR Part 11 and EudraLex Volume 4 - Annex 11 in relation to controls for computerized systems.
The qualification approach summarizes the activities and responsibilities shared between the regulated user (customer) and the cloud service provider (Microsoft) to qualify the system against the relevant regulatory requirements. A detailed assessment (see Section 3.2 and 3.3) was performed on each regulatory requirement to interpret how compliance could be achieved within the context of a GxP computerized system configured on the O365 platform. The assessment described the responsibilities of the customer and Microsoft, as well as the activities, documentation and controls (technical/procedural) that are required to meet the regulatory requirement.
The contents of this document are based on these assumptions: Audit reports listed in Section 2.4 were generated by qualified third party auditors; All information contained within the reviewed audit reports was objective and accurate at the time of the audits; Customers will perform an independent analysis and verification of related regulatory requirements to determine if the O365 platform is fit for its intended purpose; The O356 application(s) will be sufficiently documented and validated by the customer to demonstrate compliance with all applicable regulations; The customer will use only out-of-the-box functionality and will not be installing developing any customizations or 3rd party applications within the O365 environment.
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 11 of 74 Document MTM-O365-GDE-01 Revision 01 1.5 Glossary Term Definition AICPA American Institute of Certified Public Accountants CFR Code of Federal Regulations Closed System An environment in which system access is controlled by persons who are responsible for the content of electronic records that are on the system.3 Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.
The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).4 Cloud Platform as a Service (PaaS) The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.4 Cloud Software as a Service (SaaS) The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure.
The applications are accessible from various client devices through a thin client interface such as a Web browser (e.g., Web- based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user specific application configuration settings.
Computerized System Includes hardware, software, peripheral devices, personnel, and documentation; e.g., manuals and Standard Operating Procedures.5 Customer O365 user using the software service for GxP regulated activities. CV Curriculum Vitae 3 FDA 21 CFR Part 11 (Ref. ). 4 NIST Cloud Computing Standards Roadmap (Ref. ) 5 FDA, Glossary of Computer Systems Software Development Terminology (8/95)
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 12 of 74 Document MTM-O365-GDE-01 Revision 01 Term Definition Electronic Record Any combination of text, graphics, data, audio, pictorial, or other information representation in digital form that is created, modified, maintained, archived, retrieved, or distributed by a computer system.3 FDA United States Food and Drug Administration GAMP Good Automated Manufacturing Practice GFS Global Foundation Services GCP Good Clinical Practice GLP Good Laboratory Practice GMP Good Manufacturing Practice GxP Compliance requirements for all good practice disciplines in the regulated pharmaceutical sector supply chain from discovery to post marketing.6 IaaS Infrastructure as a Service ID Identifier IEC International Electrotechnical Commission ISO International Organization for Standardization ISPE International Society of Pharmaceutical Engineers IT Information Technology NDA Non-Disclosure Agreement NIST National Institute of Standards and Technology Open System An environment in which system access is not controlled by persons who are responsible for the content of electronic records that are on the system.3 O/S Operating System PaaS Platform as a Service PIC/S Pharmaceutical Inspection Convention and Pharmaceutical Inspection Co- operation Scheme Procedure The term “procedure” within the context of this document refers to any approved and effective controlled document governing specific processes (i.e.
Policy, SOP, Standard, Guide, Work Instruction).
6 PIC/S (Ref. )
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 13 of 74 Document MTM-O365-GDE-01 Revision 01 Term Definition SaaS Software as a Service SDLC Software Development Lifecycle SLA Service Level Agreement SMAPI System Management Application Program Interface SOC Service Organization Controls SOP Standard Operating Procedure SSAE Statement on Standards for Attestation Engagements SSL Secure Sockets Layer STB Microsoft Server and Tools Business TLS Transport Layer Security TSP Trust Services Principles VM Virtual Machine VPN Virtual Private Network
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 14 of 74 Document MTM-O365-GDE-01 Revision 01 2 System Overview 2.1 Global Foundation Services Global Foundation Services (GFS) delivers the core infrastructure, foundation technologies and operational support for Microsoft's Online Services environment, including O365. As described within the GFS SOC 2 report (Ref. ), the GFS operational infrastructure services include the following: Engineering and operations for core infrastructure (networking, directory services, access services, data retention and backup, hardware and software procurement, physical and environmental controls) Deployment, hosting and data center services Service support, monitoring and escalation Information security management and compliance monitoring 2.2 Microsoft Office 365 Microsoft Office O365 is subscription-based software service hosted by the Global Foundation Services group within Microsoft managed data centers.
As described within the O365 SOC 1 report (Ref. ), the O365 hosted service is offered in two ways: Microsoft Office 365 – where all customers receive a standard set of features they subscribe to, hosted on a multi-tenant basis Microsoft Office 365 Dedicated (O365-D) – hosts applications and services with a separate, secured hardware infrastructure dedicated to a single customer The services included as part of O365 and O365-D are: Microsoft SharePoint Online, Microsoft Exchange Online, Microsoft Lync Online and Microsoft Forefront Online Protection for Exchange. This guideline will focus on the Microsoft SharePoint Online service, which is the only O365 service which when configured appropriately, provides the ability to manage electronic records in manner that could satisfy applicable regulatory requirements (see Section 1.3).
SharePoint Online allows users to create and store data as well as documents in lists and libraries within SharePoint which can be configured with audit trails and versioning. In addition, user permissions can be configured to control access to the content stored with the various lists and libraries.
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 15 of 74 Document MTM-O365-GDE-01 Revision 01 In order to be able to meet regulatory requirements for encryption, the software service must also provide the ability to encrypt data which is stored within the application. The Active Directory Rights Management functionality can be configured to encrypt documents stored with SharePoint. However, this functionality is only available with the SharePoint Online Plan 2 option, which is included in the following O365 plans: Office 365 Enterprise E3 Office 365 Education A3 Office 365 Government G3 Office 365 Enterprise E4 Office 365 Education A4 Office 365 Government G4 2.3 System Classification 2.3.1 Cloud Service Model The O365 platform is classified as a public, off-premise, third-party managed solution which is offered via the SaaS cloud service model (see NIST definition in Section 1.5).
The following diagram depicts the various components of the software service which are managed by Microsoft as part of the SaaS service model.
Figure 1 – SaaS Cloud Service Model (based on Ref. )
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 16 of 74 Document MTM-O365-GDE-01 Revision 01 2.3.2 GAMP5® Category From the perspective of a regulated user (customer), Microsoft Office is considered to be Category 4 – Configured Product as defined in GAMP5® (Ref. ). A configured product refers to a commercially available software product which is configured to meet a specific business requirement. 2.3.3 FDA Classification While Microsoft is not directly responsible for the electronic records contained within the O365 platform, it is responsible for maintaining the O365 platform.
In addition, Microsoft configures the O365 platform and establishes access control requirements for logical and physical security. The O365 platform is therefore considered to be “open” (refer to definition in Section 1.5). The FDA requires open systems to meet additional requirements, such as encryption, as defined in 21 CFR Part 11.30 (Ref. ).
2.4 Microsoft Audits and Certifications The following table lists the formal audit reports prepared by third parties which were reviewed by Montrium in order to identify relevant controls which have a potential impact on compliance with the 21 CFR Part 11 (Ref. ) and Annex 11 (Ref. ) regulations. Existing Microsoft customers may request access to these reports subject to NDA terms and conditions, through their respective Microsoft account representatives. Audited Service Audit Type Date Reference No. GFS SOC 2 Type II April 18, 2012 Ref.  Office 365 SOC 1 Type II June 14, 2012 Ref.
 Office 365 ISO/IEC 27001:2005 November 16, 2012 Ref.  2.4.1 ISO/IEC 27001:2005 Certification ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented information security management system within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof.
ISO/IEC 27001:2005 certifications for O365 and Global Foundation Services can be found by clicking on the following links: Microsoft Office 365 ISO/IEC 27001:2005 certificate GFS ISO/IEC 27001:2005 certificate
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 17 of 74 Document MTM-O365-GDE-01 Revision 01 2.4.2 SOC Service Audit Reports Service Organization Controls reports are designed by the American Institute of Certified Public Accountants (AICPA) to help service organizations that operate information systems and provide information system services to other entities, build trust and confidence in their service delivery processes and controls through a report by an independent Certified Public Accountant.
SOC 1 Service Audit Reports are conducted in accordance with the professional standard known as Statement on Standards for Attestation Engagements (SSAE) No. 16. SOC 1 reports are geared towards reporting on controls at service organizations that are relevant to Internal Control over Financial Reporting, and replace the SAS 70 auditing standard.
The O365 services group has been audited by independent third party auditors to generate a SOC 1 Service Auditor’s report which examined the following control areas: Logical Access Change Management Backup and Restoration Monitoring and Incident Management Software Development Lifecycle (SDLC) Network Services SOC 2 Service Auditor’s Reports are also conducted in accordance with the professional standard of SSAE 16. SOC2 reports are intended to meet the needs of a broad range of users that need to understand internal control at a service organization as it relates to security, availability, processing integrity, confidentiality and privacy and are intended for use by stakeholders (e.g., customers, regulators, business partners, suppliers, directors) of the service organization that have a thorough understanding of the service organization and its internal controls.
The SOC 2 framework is a comprehensive set of criteria known as the Trust Services Principles (TSP) which are composed of the following five (5) sections: The security of a service organization' system The availability of a service organization's system The processing integrity of a service organization's system The confidentiality of the information that the service organization's system processes or maintains for user entities The privacy of personal information that the service organization collects, uses, retains, discloses, and disposes of for user entities The GFS services group has undergone a SOC 2 audit, to examine the suitability of the design and operating effectiveness of controls to meet the criteria for the security principle set forth in TSP section 100, Trust Services Principles and Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (Ref.
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 18 of 74 Document MTM-O365-GDE-01 Revision 01 2.5 Microsoft Controls This section describes the audited controls implemented by Microsoft which serve to assure confidentiality, integrity and availability of data stored on the O365 platform. These controls are also referenced within the compliance assessment sections (see Section 3.2 and 3.3), where they respond to applicable regulatory requirements. 2.5.1 Security Policies and Procedures Microsoft has implemented a Security Policy which applies to Microsoft O365. The Security Organization control objective within the SOC 1 audit reported that the information security policies are implemented and communicated to the applicable employees.
The GFS SOC 2 audit reported that the security policies are established, periodically reviewed and approved by a designated individual or group.
The O365 ISO/IEC 27001:2005 audit reported that an approved information security policy has been published and communicated to all employees and relevant external parties. 2.5.2 Physical and Environmental Security The physical assets on which the O365 system resides Microsoft has been audited to verify that proper physical security controls are established to protect the physical assets forming the foundation of the O365 platform as part of the GFS SOC 2 audit report. The GFS SOC 2 audit reported that the GFS services group has implemented procedures to restrict physical access to the infrastructure elements including, but not limited to: Facilities Backup media Firewalls Routers Servers The GFS ISO/IEC 27001:2005 audit reported that procedural controls are in place for tracking and monitoring physical infrastructures and services, as well as a documented methodology for determining the asset security level.
2.5.3 Logical Security The O365 SOC 1 audit reported that Microsoft has implemented logical security controls to provide reasonable assurance that logical access to the O365 production infrastructure and systems is restricted to authorized personnel. User Account Management is performed using Active Directory which centralizes the authentication and authorization to the O365 environment. Policies and standards have been implemented to enforce appropriate user account password expiration, length, complexity and history.
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc.
Page 19 of 74 Document MTM-O365-GDE-01 Revision 01 The GFS SOC2 audit reported that the GFS services group has implemented procedures to restrict logical access to the system including, but not limited to, the following measures: a. Logical access security measures to restrict access to information resources not deemed to be public b. Identification and authentication of users c. Registration and authorization of new users d. The process to make changes and updates to user profiles e. Distribution of output restricted to authorized users f. Restriction of access to offline storage, backup data, systems and media g.
Restriction of access to system configurations, super-user functionality, master passwords, power utilities and security devices (for example, firewalls) The O365 ISO/IEC 27001:2005 audit reported that the logical access to the system is restricted to authorized personnel in accordance with an enforced access control policy. 2.5.4 System Monitoring and Maintenance The O365 SOC 1 audit reported that proper controls are established to provide reasonable assurance that the O365 platform is monitored to detect and remediate any security vulnerabilities.
The following activities/controls were audited in relation to system monitoring and maintenance: Vulnerability and Patch Management Security Incident Management The GFS SOC 2 audit reported that proper controls are established to monitor the GFS infrastructure components and proper actions are taken to maintain compliance within its defined system security policies. Automated tools are used to monitor the security controls on a regular basis. The GFS group monitors, logs, reports and takes appropriate action to resolve events involving critical/suspicious activities.
2.5.5 Data Backup, Recovery and Retention The O365 SOC 1 audit reported that O365 utilizes secure backup system infrastructure delivered by the Global Foundation Services Data Protection Services.
The GFS SOC 2 audit reported that the GFS Data Protection Services group provides secure backup retention and restoration of data in the Microsoft Online Services environment. The audit also reported that the recovery and backup process is tested on an annual basis 2.5.6 Confidentiality The following excerpt for the publicly available Office 365 Standard Response to Request for Information - Security and Privacy (Ref. ) describes the technical controls which help to ensure confidentiality of data as it transmits between the customer and the O365 platform:
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 20 of 74 Document MTM-O365-GDE-01 Revision 01 “Customer access to services provided over the Internet originates from users’ Internet-enabled locations and ends at a Microsoft data center. These connections established between customers and Microsoft data centers are encrypted using industry-standard Transport Layer Security (TLS) /Secure Sockets Layer (SSL). The use of TLS/SSL effectively establishes a highly secure browser-to-server connection to help provide data confidentiality and integrity between the desktop and the data center.
Filtering routers at the edge of the Office 365 services network provides security at the packet level for preventing unauthorized connections to Office 365 Services.” The GFS SOC 2 audit reported that encryption or other equivalent security techniques are used to protect user authentication information and the corresponding session transmitted over the internet or other public networks.
2.5.7 Software Development / Change Management The O365 SOC 1 audit reported that a formal SDLC process is defined which governs the development of new features or major changes to the O365 platform with the goal of minimizing processing errors and security vulnerabilities within the environment. The SDLC process encompasses the following phases: Requirements gathering Design Implementation Verification Release Key stakeholders are required to provide approval of the tested code prior to deployment of newly developed or changed code into the production environment. The O365 SOC 1 audit also reported that a formal change control process has been established to provide reasonable assurance that changes to the production environment are made in a controlled manner.
Ticketing systems are used to track changes which contain documented details including appropriate authorizations and approvals.
The GFS SOC 2 audit of the GFS services verified adequate IT change management controls are established surrounding the following topics: Service Infrastructure and Support Systems Change Management Secure Configuration – Imaging Network Change Management Network Patch Management The O365 ISO/IEC 27001:2005 audit reported that a procedural document covering change management is in place which covers security impact analysis, change control and component inventory management.
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc.
Page 21 of 74 Document MTM-O365-GDE-01 Revision 01 2.5.8 Incident Management The O365 SOC 1 audit reported that adequate processes are established governing how incidents within the production environment are documented and resolved in a timely manner. The processes are part of an incident management framework that includes defined process roles, responsibilities, and communications for managing the detection, escalation and response to incidents.
The GFS SOC 2 audit reported that procedures exist to identify, report, and act upon system security breaches and other incidents. The Security Incident Management team ensures the Security Response procedures are tested annually. The O365 ISO/IEC 27001:2005 audit reported that mechanisms are in place for logging and monitoring security incidents in O365. Any security events are reported in a timely manner through the appropriate management channels. 2.5.9 Service Level Agreements Microsoft provides Service Level Agreements (SLA) related to the O365 and O365-D Dedicated application service, which are available for download from the Microsoft website.
2.5.10 Risk Assessment The O365 SOC 1 audit reported that as part of the SDLC process Microsoft has implemented a comprehensive threat modeling process to identify potential security and privacy issues. Detailed risk assessments covering both security and privacy are performed with the objective of remediating any issues detected.
The GFS SOC 2 audit reported that risk assessments are performed within the context of network device change management to evaluate potential risks associated with the change. 2.5.11 Documentation / Asset Management The procedure governing software development was audited against a control objective which stipulates that the development of new features or major changes must be documented. In addition, Microsoft has confirmed to Montrium that a Document and Records Management procedure governing protection and retention of documentation is in force. Microsoft has also indicated to Montrium that the baseline configuration of O365 components is documented, managed, maintained and controlled for access via access control mechanisms.
Additionally, this configuration is performed according to the Asset management guidelines. 2.5.12 Training Management The O365 SOC 1 audit reported that all Microsoft employees receive mandatory training on Microsoft Standards of Business conduct on an annual basis. Microsoft O365 staff and contingent staff are accountable for understanding and adhering with the Microsoft Online Services Security Policy.
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 22 of 74 Document MTM-O365-GDE-01 Revision 01 The GFS SOC 2 audit reported security policies concerning information security and business conduct were implemented. Training is mandatory for all employees on these policies. Procedures and standards cover policy training and training requirements. Training is documented and compliance with training requirements is monitored. The O365 ISO/IEC 27001:2005 audit reported that Microsoft has a formal security and awareness training program which includes security responsibilities, asset ownership, and classification.
2.5.13 Disaster Recovery The GFS SOC 2 audit reported processes for backing-up critical components and data, customer data and credentials are defined and tested on an annual basis. Backup frequency and retention period is based on the type of data. Data centers used for backup are in a different geographical location than the primary data center. The O365 ISO/IEC 27001:2005 audit reported that Microsoft has a formal business continuity process that describes the information security requirements. 2.5.14 Vendor Management The O365 SOC 1 audit reported that third party vendors have specific statements of work with service level agreements that are monitored for compliance and adherence.
The Microsoft Online Services Delivery Platform group works with vendor companies to perform background checks on individuals before they are granted access to the production environment.
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 23 of 74 Document MTM-O365-GDE-01 Revision 01 3 Qualification Approach Qualification is defined as “a process of demonstrating the ability of an entity to fulfill specified requirements. In the context of an IT Infrastructure, this means demonstrating the ability of components such as servers, clients, and peripherals to fulfill the specified requirements for the various platforms regardless of whether they are specific or of a generic nature.”7 According to industry best practices as proposed within the GAMP Good Practice Guide: IT Infrastructure Control and Compliance7 , in order for an IT infrastructure platform to be considered qualified and compliant, the following critical aspects need to be considered: Installation and operational qualification of infrastructure components Configuration management and change control of infrastructure components Management of risks to IT Infrastructure Involvement of service providers in critical infrastructure processes Security management in relation to access controls, availability of services and data integrity Data Backup, Restore, Disaster Recovery, Archiving In the context of a public SaaS cloud service model, the customer does not have control over the underlying infrastructure hardware and software components, nor to the application itself.
The cloud service provider is responsible for managing and maintaining these components and ensuring that they meet the terms defined within the governing Service Level Agreement(s). Microsoft has implemented controls (see Section 2.5) which encompass these critical aspects of IT infrastructure compliance. Figure 2 – Qualification of Infrastructure vs. Validation of Applications Validation consists of demonstrating, with objective evidence, that a system meets the requirements of the users and their processes and is compliant with applicable GxP regulations. In order to remain in a validated state, appropriate operational controls must be implemented throughout the life of the system.
As such, validation is performed by the regulated users (customer) of the GxP computerized 7 ISPE, GAMP Good Practice Guide: IT Infrastructure Control and Compliance (Ref. ) Applications Infrastructure Software & Tools Network Components Infrastructure Hardware Data Center Facilities Validation Qualification
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 24 of 74 Document MTM-O365-GDE-01 Revision 01 systems that reside on the O365 platform. The following diagram depicts the typical deliverables and activities required in order the implement and validate a system and maintain its validated state during operation. Figure 3 – Typical Validation Activities/Deliverables Additional information for GxP computerized system validation can be found within the following guidance documents: PIC / S - Good Practices for Computerised Systems in Regulated “GxP” Environments (Ref.
) GAMP 5 - A Risk-Based Approach to Compliant GxP computerized systems (Ref. ) 3.1 Qualification Activities and Responsibilities By utilizing the O365 platform, the customer is effectively outsourcing the management and operations of their IT infrastructure and of the application development to Microsoft. However, it is important to note that, “the regulated company remains responsible for the regulatory compliance of their IT operations regardless of whether they choose to outsource/offshore some or all of their IT Infrastructure processes to external service provider(s). Compliance oversight and approvals cannot be delegated to the outsource partner.”8 8 ISPE, GAMP Good Practice Guide: IT Infrastructure Control and Compliance (Ref.
) • Validation Plan and Reporting • User Requirement and Acceptance Testing • Installation Qualification Implementation • Incident Management • Operational Change Control • Periodic Review Operation
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 25 of 74 Document MTM-O365-GDE-01 Revision 01 A summary of the Customer’s and Microsoft’s responsibilities, as they relate to the qualification and validation activities is provided below. A detailed description of each party’s responsibilities, as they relate to the applicable regulatory requirements, is provided in Section 3.2 (21 CFR Part 11) and Section 3.3 (Annex 11). 3.1.1 Summary of Microsoft Responsibilities Microsoft is responsible for ensuring that O365 meets the terms defined within the governing Service Level Agreements (see Section 2.5.9).
When new customer environments are deployed within the O365 platform, they are created using the default configuration established by Microsoft. Microsoft is responsible for ensuring the system is capable of meeting the specifications and the terms of the SLA(s).
The O365 platform must be managed in a controlled and secured manner, so as to provide the following key elements in relation to customer data: Confidentiality - ensuring that information is accessible only to those authorized to have access Integrity - safeguarding the accuracy and completeness of information and processing methods Availability - ensuring that authorized users have access to information and associated assets when required The controls identified in Section 2.5 are implemented, managed and maintained by Microsoft to ensure that the above key requirements can be met.
3.1.2 Summary of Customer Responsibilities The customer is responsible for performing the following activities for each GxP computerized system requiring qualification and validation within the O365 platform: 1) Develop or identify procedural controls governing the use of the GxP computerized system.
These procedural controls should cover the topics as described in Appendix A, as well as any other controlled processes which are impacted by the GxP computerized system including the following: a. Use of Live IDs and passwords b. Account access to the O365 platform c. Compliance management with applicable laws and regulations d. Customer data encryption requirements e. O365 SMAPI access certificates acquisition f. Data access mechanism (public or signed access) for data contained with the O365 platform g. SharePoint environment configuration h. Data backup upon O365 subscription termination
Qualification Guideline for Microsoft Office 365 © 2013 Montrium Inc. Page 26 of 74 Document MTM-O365-GDE-01 Revision 01 i. Protection of account-related secrecy j. Security Development Lifecycle for applications developed on O365 k. Quality assurance of applications before moving to O365 Production l. Security monitoring for applications developed on O365 m. Public O365 security and patch updates review n. Patch application when not subscribed to auto-upgrade o. Incident and alert reporting to Microsoft when those are specific to customer systems and O365 p. Incident response support with the O365 team 2) Determine the GxP requirements that apply to the O365 based on its intended use.
3) Follow internal procedures governing Qualification and/or Validation processes, expected deliverables would include but are not limited to: a. Qualification / Validation plan describing the activities, responsibilities and deliverables to be produced for GxP computerized system configured on the O365 platform b. Specification documentation describing the GxP computerized system’s requirements, functionality and intended use c. Risk Assessments covering both the decision to configure the GxP computerized system within the O365 platform, and a functional risk assessment of the GxP computerized system.
The assessments should include mitigation actions required to address identified risks d. Verification documentation providing evidence that the GxP computerized system meets its intended use as defined within relevant specification documents 4) Maintain and operate the GxP computerized system in a secure and controlled manner according to internally developed procedures as defined in point 1) above. 3.2 US FDA 21 CFR Part 11 Electronic Records; Electronic Signatures Compliance Assessment The following table outlines the assessment that was performed on each regulatory requirement of US FDA 21 CFR Part 11 which were identified as in scope in Section 1.2 of this document.
The primary objective of the assessment is to identify the procedural and technical controls that are required to satisfy the different regulatory requirements.
In conjunction with the responsibilities identified in Section 3.1, we further identify which controls fall within the responsibility of Microsoft versus the controls that are considered the responsibility of the customer when using the O365 platform for regulated GxP computerized systems.